CVE-2020-7247
Published: 29 January 2020
smtp_mailaddr in smtp_session.c in OpenSMTPD 6.6, as used in OpenBSD 6.6 and other products, allows remote attackers to execute arbitrary commands as root via a crafted SMTP session, as demonstrated by shell metacharacters in a MAIL FROM field. This affects the "uncommented" default configuration. The issue exists because of an incorrect return value upon failure of input validation.
From the Ubuntu security team
It was discovered that OpenSMTPD incorrectly verified the sender's or receiver's e-mail addresses under certain conditions. An attacker could use this vulnerability to execute arbitrary commands as root.
Priority
CVSS 3 base score: 9.8
Status
Package | Release | Status |
---|---|---|
opensmtpd Launchpad, Ubuntu, Debian |
bionic |
Released
(6.0.3p1-1ubuntu0.1)
|
eoan |
Released
(6.0.3p1-6ubuntu0.1)
|
|
focal |
Not vulnerable
(6.6.2p1-1)
|
|
groovy |
Not vulnerable
(6.6.2p1-1)
|
|
hirsute |
Not vulnerable
(6.6.2p1-1)
|
|
impish |
Not vulnerable
(6.6.2p1-1)
|
|
jammy |
Not vulnerable
(6.6.2p1-1)
|
|
precise |
Does not exist
|
|
trusty |
Does not exist
|
|
upstream |
Released
(6.6.2p1-1)
|
|
xenial |
Ignored
(end of standard support, was needed)
|
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7247
- https://www.openwall.com/lists/oss-security/2020/01/28/3
- https://ftp.openbsd.org/pub/OpenBSD/patches/6.6/common/019_smtpd_exec.patch.sig
- https://github.com/OpenSMTPD/OpenSMTPD/commit/be6ef06cba9484d008d9f057e6b25d863cf278ff (opensmtpd-6.4.0)
- http://packetstormsecurity.com/files/156137/OpenBSD-OpenSMTPD-Privilege-Escalation-Code-Execution.html
- http://packetstormsecurity.com/files/156145/OpenSMTPD-6.6.2-Remote-Code-Execution.html
- http://www.openwall.com/lists/oss-security/2020/01/28/3
- https://seclists.org/bugtraq/2020/Jan/51
- https://www.debian.org/security/2020/dsa-4611
- https://www.kb.cert.org/vuls/id/390745
- https://www.openbsd.org/security.html
- https://ubuntu.com/security/notices/USN-4268-1
- NVD
- Launchpad
- Debian